A method is presented for increasing data throughput in a communications channel comprising the steps of selecting a first data packet from a queue of data packets to be transmitted over a communications channel, modulating said first data packet using a first modulation scheme, selecting a second data packet from a queue of data packets to be transmitted over the communications channel, modulating the second data packet using a second modulation scheme overlaying the first data packet on a symbol by symbol basis, transmitting the first data packet overlaid with second data packet over the communications channel, determining whether the first data packet was received by monitoring using the first modulation scheme for an acknowledgment for the first data packet before expiration of a timeout period, determining whether the second data packet was received by monitoring using the first modulation scheme for an acknowledgment for the second data packet before expiration of the timeout period and repeating the steps outlined above, if acknowledgments were received for both the first and the second data packets. A system is presented for increasing data throughput in a communications channel comprising means for implementing the process outlined above.
|
1. A method for increasing data throughput in a communications channel comprising the steps of:
selecting a first data packet from a queue of data packets to be transmitted over said communications channel;
modulating said first data packet using a first modulation scheme;
selecting a second data packet from a queue of data packets to be transmitted over said communications channel;
modulating said second data packet using a second modulation scheme overlaying said first data packet;
transmitting said first data packet overlaid with said second data packet over said communications channel;
determining whether said first data packet was received by monitoring using said first modulation scheme for an acknowledgment for said first data packet before expiration of a timeout period;
determining whether said second data packet was received by monitoring said first modulation scheme for an acknowledgment for said second data packet before expiration of said timeout period; and
repeating all of the the steps outlined above, if acknowledgments were received for both said first and said second data packets.
17. A system for increasing data throughput in a communications channel comprising:
means for selecting a first data packet from a queue of data packets to be transmitted over said communications channel;
means for modulating said first data packet using a first modulation scheme;
means for selecting a second data packet from a queue of data packets to be transmitted over said communications channel;
means for modulating said second data packet using a second modulation scheme overlaying said first data packet;
means for transmitting said first data packet overlaid with said second data packet over said communications channel;
means for determining whether said first data packet was received by monitoring using said first modulation scheme for an acknowledgment for said first data packet before expiration of a timeout period;
means for determining whether said second data packet was received by monitoring using said first modulation scheme for an acknowledgment for said second data packet before expiration of said timeout period; and
means for performing an iterative loop encompassing the system above, if acknowledgments were received for both said first and said second data packets.
9. A method for for increasing data throughput in a communications channel comprising the steps of:
selecting a first data packet from a queue of data packets to be transmitted over said communications channel;
modulating said first data packet using a first modulation scheme;
selecting a second data packet from a queue of data packets to be transmitted over said communications channel;
modulating said second data packet using a second modulation scheme overlaying said first data packet;
transmitting said first data packet overliad with said second data packet over said communications channel;
determining whether said first data packet was received by monitoring using said first modulation scheme for an acknowledgment for said first data packet before expiration of a timeout period;
determining whether said second data packet was received by monitoring using said first modulation scheme for an acknowledgment for said second data packet before expiration of said timeout period; and
using said second data packet as the selected first packet and repeating the steps outlined above commencing with said modulating step for said first data packet, if no acknowledgment was received for said second data packet prior to expiration of said timeout period.
25. A system for increasing data throughput in a communications channel comprising the steps of:
means for selecting a first data packet from a queue of data packets to be transmitted over said communications channel;
means for modulating said first data packet using a first modulation scheme;
means for selecting a second data packet from a queue of data packets to be transmitted over said communications channel;
means for modulating said second data packet using a second modulation scheme overlaying said first data packet;
means for transmitting said first data packet overlaid with second data packet over said communications channel;
means for determining whether said first data packet was received by monitoring using said first modulation scheme for an acknowledgment for said first data packet before expiration of a timeout period;
means for determining whether said second data packet was received by monitoring using said first modulation scheme for an acknowledgment for said second data packet before expiration of said timeout period;
means for using said second data packet as the selected first packet; and
means for performing an iterative loop of a portion of the system outlined above commencing with said means for modulating said first data packet, if no acknowledgment was received for said second data packet prior to expiration of said timeout period.
2. The method according to
4. The method according to
6. The method according to
7. The method according to
8. The method according to
10. The method according to
12. The method according to
14. The method according to
15. The method according to
16. The method according to
18. The method according to
20. The method according to
22. The method according to
23. The system according to
24. The system according to
26. The method according to
28. The system according to
30. The method according to
31. The system according to
32. The system according to
|
The invention relates broadly to the field of telecommunications and particularly to a method and system for increasing data throughput in communications channels, subject to fading and other non-Additive White Gaussian Noise (AWGN) impairments, on an opportunistic basis.
Many communications standards are unable to effectively use the entire potential throughput of the channel specified in the standard due to the time-varying nature of that channel. To provide a reliable level of information flow, the data encoding and modulation is chosen to be relatively conservative. That is, even during a “bad” interval, information can still be effectively passed/communicated. However, it is often the case that the channel is much better than the pessimistic assumption, and more data could be reliably passed given knowledge about the quality of the channel.
Current communications standards are capable of adapting to channel variations, but only crudely. The most common approaches require the transmitter and receiver to make measurements, analyze the data, agree to change the modulation/coding used, and finally to synchronize the change. This is often a slow process that is ineffective in dealing with rapidly changing channel environments.
There is a great deal of interest in moving as much data as possible through a given channel or link. The more data that can be communicated through an existing given channel or link that already exists the longer the deployment of additional infrastructure can be postponed. If that increased throughput can be accomplished while maintaining backward compatibility, then customers need not replace or upgrade their equipment until they need the increased data rate. Further, a scheme for improving throughput according o the present invention can be used as a service differentiator for customers allowing for increased fees for customers electing to use services based on the method and system presented herein.
“A Method and Apparatus for Enhanced Communication Capability While Maintaining Standard Channel Modulation Compatibility” (U.S. Pat. No. 5,987,068, by Cassia et al., hereinafter “Cassia”) assigned to Motorola discloses a radio communication system for providing an enhanced communication that combines a first information signal generated “from data according to a predefined standard modulation scheme” and a second information signal generated “from data that provides supplemental information to the standard modulated data” (emphasis added).
In contrast, the method of the present invention is used in a packet data communications system and further does not combine the two information signals in a multiplexing sense but rather overlays two packets. Furthermore, the second modulation scheme carrying data in the present system does not carry “supplemental information” but rather carries packets which if unacknowledged must be retransmitted. “Supplemental information” would include “supplementary or extra data, that although not necessary for normal communication operations, provide enhancement to the information supplied by the standard data”.
Consequently, the novel concept presented here is the introduction of additional modulation on top of the primary modulation (“fractal” modulation) to increase data throughput on an opportunistic basis. It is important to note that while two modulation schemes are used, the signals are not combined or multiplexed but rather a second data packet modulated using a second modulation scheme is overlayed over a first packet for transmission over a communications channel. Also, the secondary signal is not supplemental but rather a second data packet with live data. The purpose, therefore, of the present invention is to increase data throughput rather to than to enhance communications with supplemental information.
It is an object of the present invention to increase data throughput over a communications channel or link on an opportunistic basis.
It is a further object of the present invention to increase data throughput over a channel or link by overlaying an additional (secondary) modulation on top of a primary modulation scheme.
A further object of the present invention is to allow existing systems to maintain backwards compatibility to existing standards.
It is yet another object of the present invention to allow the use of existing devices to be used transparently in systems with the enhancement presented herein.
The invention is best described with reference to the detailed description and the following figures, where:
In a preferred embodiment, the invention is directed to a packet communication system, including wireless, cable, or wired packet communication systems. The basic idea trades off a certain amount of signal-to-noise tolerance in the primary modulation scheme to incorporate the secondary modulation scheme with the expectation that the information in a second data packet can be reliably received often enough to make it worthwhile. As long as the transmitter has a queue of information packets to be sent, it always places information in a second data packet modulated using a secondary modulation scheme as well as in a first (primary) data packet modulated using the primary modulation scheme. If the receiver is only able to correctly decode data in the primary data packet, then only that packet gets acknowledged. However, if the second data packet can also be decoded correctly, then that packet is also acknowledged back to the transmitter. To ensure reliable transfer, all acknowledgments are modulated using the primary modulation scheme. Lack of an acknowledgment before the expiration of a timeout period acts an implicit negative acknowledgment.
A possible dataflow sequence follows:
Transmitter
Receiver
Primary
Secondary
Direction of
Primary
Secondary
Modulation
Modulation
Flow
Modulation
Modulation
Packet 1
Packet 2
Packet 1
Error
ACK 1
(NACK 2)
ACK 1
Packet 2
Packet 3
Packet 2
Packet 3
ACK 2
ACK 3
ACK 2
ACK 3
In the above example, the transmitter takes a first packet (Packet 1) from a queue of packets to transmit using a primary modulation scheme. A second packet (Packet 2) is then taken from the queue to transmit using a secondary modulation scheme overlaid over the primary modulation scheme. The receiver accurately receives the first packet (Packet 1) only. There is an error or errors and the second packet (Packet 2) is not correctly received. The quality of the channel or link is not sufficient to carry the additional data. The receiver acknowledges (ACK 1) to the transmitter and fails to acknowledge the second packet (Packet 2). The transmitter upon receipt of the acknowledgment for the first packet (Packet 1) and lack of acknowledgment before the expiration of a timeout period of the second packet (Packet 2) retransmits the second packet (Packet 2) using the primary modulation scheme and takes a third packet (Packet 3) from the queue for transmission using the secondary modulation scheme overlaid over the primary modulation scheme. The quality of the channel or link has changed and both the second and third packets (Packets 2 and 3) have been correctly received. The receiver then acknowledges the second packet (Packet 2) and the third packet (Packet 3) using ACK 2 and ACK 3 respectively. In all cases the acknowledgments are transmitted using the primary modulation scheme.
One possible embodiment of such a fractal modulation scheme applied to Quadrature Phase Shift Keying (QPSK) is reflected in FIG. 1. In
The secondary modulation scheme is overlaid over the primary modulation scheme in the following manner. A first data packet is taken from a queue of data packets to be transmitted and modulated according to a first (primary) modulation scheme. A second data is taken from the queue of data packets to be transmitted. The first symbol of the first data packet is inspected to determine which point of the constellation of the primary modulation scheme it is. For example, it could be in the fourth quadrant. The first symbol of the second data packet is then inspected to determine which point in the constellation of the secondary modulation scheme it is. For clarity, calling the secondary constellation sub-quadrants, for example, the first symbol of the second packet might be in the third sub-quadrant of the secondary constellation. The symbols are now encoded as the third sub-quadrant of the fourth quadrant. This is done for each symbol of each pair of data packets to be overlaid. The overlaid packet is then transmitted over a communications channel. At the receiver, if the receiver is capable of decoding using the overlay scheme and the communications channel is of sufficient quality then the decoding process proceeds. If the receiver is not capable of decoding using the overlay scheme or the channel quality was not sufficient to properly decode the overlay, then it appears to the receiver that a symbol in the fourth quadrant was sent but that it was slightly noisy due to channel quality.
When the channel is good, the secondary modulation can also be decoded, significantly increasing data throughput. What this means is that the secondary payload is encoded and transmitted and a receiver capable of decoding the secondary payload decodes it correctly assuming that the channel is of sufficient quality. However, to a receiver not capable of receiving and decoding the secondary payload, it merely appears to be a primary payload with some noise. This method presented herein has a very desirable aspect in that it maintains backwards compatibility to existing standards. This is beneficial in two ways. First, it allows existing devices to be used transparently in systems with the enhancement. Users may upgrade as their needs demand. Second, this type of modulation scheme may be used to provide a proprietary service differentiation for customers (if you use our system and our terminals, you get a faster data connection).
Use of QPSK modulation is an exemplary embodiment only and not limited in any sense. Any currently defined digital modulation scheme could be used with the same or similar benefits accruing to the use of a secondary modulation scheme overlaid over a primary modulation scheme, for example Quadrature Amplitude Modulation (QAM). The primary or first modulation scheme need not be identical with the second modulation scheme. It is, however, to be remembered that the secondary modulation scheme should be more error-tolerant than the first modulation scheme. For example, it would be reasonable to use QAM as the first modulation scheme with QPSK as the second modulation scheme.
Simulation of this QPSK example in a Rayleigh environment suggests that 25% to 50% more data can be passed by adding the secondary modulation. In a sample embodiment, a primary payload (data transmitted on a first or primary path) of 184 bits is assumed. A secondary payload of 116 bits is assumed. Some coding scheme is needed for error protection. The coding scheme for the secondary payload needs to be greater than that used for the primary payload accounting for a slightly diminished secondary payload. Assuming the use of Reed-Solomon coding (as an example) and further assuming an attenuation of 3 dB, it can be shown that the probability of error in the primary payload is approximately 8.756*10−3 and that the probability of error in the secondary payload is approximately 4.281*10−1. That is, there is a greater probability of error in the secondary payload. The probability of an attenuation of between 3.5 dB and 2.5 dB is approximately 12%. Further, it can be shown that at a 1 dB gain, there is a probability of error in the primary payload of approximately 1.175*10−9 and a probability of error in the secondary payload of approximately 4.653*10−2. The probability of a gain between 0.5 dB and 1.5 dB is approximately 16%. Similarly, it can be shown that for a 4 dB gain that the probability of error for the primary payload approaches 0 and that the probability of error for the secondary payload is approximately 7.138*10−5. The probability of a gain between 3.5 dB and 4.5 dB is approximately 6%.
The remote device receives the data and responds with an ACK 445 (for primary ACK) and 450 (for secondary ACK) if received correctly, a NACK 445 (for primary NACK) and 450 (for secondary NACK) if received incorrectly or a NACK is assumed if no ACK is received within a timeout period, or no response at all (if the remote device has no capability to process the secondary modulation). All ACKs and NACKs are transmitted over a primary (first) channel using a primary (first) modulation scheme. These responses are received and decoded by the modulation/demodulation DSP, and are passed to the protocol handling process in the microprocessor. Based on the response received (or lack of response), the protocol handling process determines whether the packet transmitted was successfully received. If the packet was not successfully received, the unsuccessful packet is retransmitted using the primary modulation scheme. Data transmission continues until all packets have been successfully transferred to the remote device.
Bidirectional communication is made possible when both the local and remote devices are equipped as shown.
The present invention may be implemented in hardware, software or firmware as well as Application Specific Integrated Circuits (ASICs), Reduced Instruction Set Computer (RISC) processors or Field Programmable Gate Arrays (FPGAs) or any other means by which the functions and process disclosed herein can be effectively and efficiently accomplished or any combination thereof. The above means for implementation should not be taken to be exhaustive but merely exemplary and therefore, not limit the means by which the present invention may be practiced.
It should be clear from the foregoing that the objectives of the invention have been met. While particular embodiments of the present invention have been described and illustrated, it should be noted that the invention is not limited thereto since modifications may be made by persons skilled in the art. The present application contemplates any and all modifications within the spirit and scope of the underlying invention disclosed and claimed herein.
Patent | Priority | Assignee | Title |
7680278, | Feb 04 2004 | Microsoft Technology Licensing, LLC | Domino scheme for wireless cryptographic communication and communication method incorporating same |
7860500, | Oct 27 2006 | MOTOROLA SOLUTIONS, INC | Method and apparatus for determining appropriate channels for communication |
9480033, | May 04 2012 | Itron, Inc | Managing overlapping messages in a network environment |
Patent | Priority | Assignee | Title |
4891806, | Sep 18 1987 | RACAL-DATACOM, INC | Constellation multiplexed inband secondary channel for voiceband modem |
5241544, | Nov 01 1991 | MOTOROLA SOLUTIONS, INC | Multi-channel TDM communication system slot phase correction |
5394440, | Feb 06 1991 | PC TEL, INC | High speed modem systems incorporating distribution preserving Tomlinson encoding and decoding for secondary channels |
5548253, | Apr 17 1995 | Intel Corporation | Spectrally efficient quadrature amplitude modulator |
5559810, | Mar 31 1994 | Google Technology Holdings LLC | Communication of data reception history information |
5612651, | Jan 02 1996 | Lockheed Martin Corporation | Modulating array QAM transmitter |
5655003, | Sep 18 1995 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | Wireless terminal having digital radio processing with automatic communication system selection capability |
5881109, | Jun 28 1996 | PENDRAGON ELECTRONICS AND TELECOMMUNICATIONS RESEARCH LLC | Pulse shaping filter for π/4-shift QPSK modulator |
5949799, | Dec 27 1996 | MONTEREY RESEARCH, LLC | Minimum-latency data mover with auto-segmentation and reassembly |
5978650, | Jan 21 1997 | CommScope Technologies LLC | System and method for transmitting data |
5987068, | Nov 10 1995 | MOTOROLA SOLUTIONS, INC | Method and apparatus for enhanced communication capability while maintaining standard channel modulation compatibility |
6041074, | May 24 1996 | Ricoh Company, Ltd. | Spread spectrum pulse position modulation system |
6055266, | Aug 09 1996 | Ricoh Company | Spread spectrum pulse position modulation communication system |
6061408, | Apr 17 1998 | TIERNAN RADYNE COMSTREAM, INC | Method and apparatus for 45° phase ambiguity resolution for one coded bit per symbol 8PSK modulation |
6167031, | Aug 29 1997 | HIGHBRIDGE PRINCIPAL STRATEGIES, LLC, AS COLLATERAL AGENT | Method for selecting a combination of modulation and channel coding schemes in a digital communication system |
6298092, | Dec 15 1999 | Intel Corporation | Methods of controlling communication parameters of wireless systems |
6760882, | Sep 19 2000 | Apple Inc | Mode selection for data transmission in wireless communication channels based on statistical parameters |
20020009157, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 13 2001 | ERVING, RICHARD HENRY | AT&T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011685 | /0924 | |
Mar 27 2001 | AT&T Corp. | (assignment on the face of the patent) | / | |||
Aug 14 2008 | AT&T Properties, LLC | AT&T INTELLECTUAL PROPERTY II, L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021709 | /0589 | |
Oct 14 2008 | AT&T Corp | AT&T Properties, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021709 | /0555 | |
Oct 14 2008 | AT&T Properties, LLC | AT&T INTELLECTUAL PROPERTY II, L P | CORRECTIVE ASSIGNMENT TO CORRECT THE THE EXECUTION DATE IDENTIFIED ON THE ASSIGNMENT RECORDATION OF 10 21 2008, FROM 8 14 2008 TO 10 14 2008 PREVIOUSLY RECORDED ON REEL 021709 FRAME 0589 ASSIGNOR S HEREBY CONFIRMS THE ASSIGNMENT | 021731 | /0189 | |
Oct 30 2008 | AT&T INTELLECTUAL PROPERTY II, L P | Open Invention Network LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021763 | /0482 |
Date | Maintenance Fee Events |
Sep 18 2008 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Dec 04 2008 | ASPN: Payor Number Assigned. |
Aug 12 2009 | ASPN: Payor Number Assigned. |
Aug 12 2009 | RMPN: Payer Number De-assigned. |
Nov 21 2012 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Dec 08 2016 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 21 2008 | 4 years fee payment window open |
Dec 21 2008 | 6 months grace period start (w surcharge) |
Jun 21 2009 | patent expiry (for year 4) |
Jun 21 2011 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 21 2012 | 8 years fee payment window open |
Dec 21 2012 | 6 months grace period start (w surcharge) |
Jun 21 2013 | patent expiry (for year 8) |
Jun 21 2015 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 21 2016 | 12 years fee payment window open |
Dec 21 2016 | 6 months grace period start (w surcharge) |
Jun 21 2017 | patent expiry (for year 12) |
Jun 21 2019 | 2 years to revive unintentionally abandoned end. (for year 12) |